Search results

1 – 10 of 753
Article
Publication date: 10 October 2016

Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…

Abstract

Purpose

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network.

Design/methodology/approach

This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network.

Findings

A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms.

Originality/value

It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 February 1983

M.P. Howarth and M.F. Guyote

Eddy current and ultrasonic sensing have potentially large advantages over vision systems for guidance of arc welding, except with very complex geometries. They are simpler, less…

Abstract

Eddy current and ultrasonic sensing have potentially large advantages over vision systems for guidance of arc welding, except with very complex geometries. They are simpler, less expensive, and eddy current is immune to fumes from the arc. The authors review work currently in progress at Oxford.

Details

Sensor Review, vol. 3 no. 2
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 21 September 2021

Satyanarayana Pamarthi and R. Narmadha

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine…

423

Abstract

Purpose

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

Findings

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 14 October 2019

Rajendran N., Jawahar P.K. and Priyadarshini R.

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing…

Abstract

Purpose

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.

Design/methodology/approach

It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.

Findings

The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.

Research limitations/implications

In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).

Practical implications

It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.

Social implications

When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.

Originality/value

The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 3 February 2012

Robert Kay and Marc Desmulliez

The purpose of this paper is to present a detailed overview of the current stencil printing process for microelectronic packaging.

1318

Abstract

Purpose

The purpose of this paper is to present a detailed overview of the current stencil printing process for microelectronic packaging.

Design/methodology/approach

This paper gives a thorough review of stencil printing for electronic packaging including the current state of the art.

Findings

This article explains the different stencil technologies and printing materials. It then examines the various factors that determine the outcome of a successful printing process, including printing parameters, materials, apparatus and squeegees. Relevant technical innovations in the art of stencil printing for microelectronics packaging are examined as each part of the printing process is explained.

Originality/value

Stencil printing is currently the cheapest and highest throughput technique to create the mechanical and electrically conductive connections between substrates, bare die, packaged chips and discrete components. As a result, this process is used extensively in the electronic packaging industry and therefore such a review paper should be of interest to a large selection of the electronics interconnect and assembly community.

Details

Soldering & Surface Mount Technology, vol. 24 no. 1
Type: Research Article
ISSN: 0954-0911

Keywords

Article
Publication date: 25 June 2024

Emma O’Neill, Molly Bird and Simon Riches

Auditory hallucinations (“hearing voices”) are a relatively common experience, which is often highly distressing and debilitating. As mental health services are under increasing…

Abstract

Purpose

Auditory hallucinations (“hearing voices”) are a relatively common experience, which is often highly distressing and debilitating. As mental health services are under increasing pressures, services have witnessed a transformative shift with the integration of technology into psychological care. This study aims to narratively synthesise evidence of technology-enhanced psychological assessment and treatment of distressing voices (PROSPERO 393831).

Design/methodology/approach

This review was carried out according to the preferred reporting items for systematic reviews and meta-analyses. Embase, MEDLINE, PsycINFO and Web of Science were searched until 30th May 2023. The Effective Public Health Practice Project (EPHPP) tool assessed methodological quality of studies.

Findings

Searching identified 9,254 titles. Fourteen studies (two assessment studies, twelve treatment studies, published 2010–2022, n = 1,578) were included in the review. Most studies were conducted in the UK, the USA or Canada. Technologies included avatar therapy, mobile apps, virtual reality, a computerised Web-based programme and a mobile-assisted treatment. Overall, technology-enhanced psychological assessments and treatments appear feasible, acceptable and effective, with avatar therapy the most used intervention. EPHPP ratings were “strong” (n = 8), “moderate” (n = 5) and “weak” (n = 1).

Originality/value

To the best of the authors’ knowledge, this is the first systematic review to investigate these technologies, specifically for distressing voices. Despite the relatively small number of studies, findings offer promising evidence for the clinical benefits of these technologies for enhancing mental health care for individuals with distressing voices. More high-quality research on a wider range of technologies is warranted.

Details

Mental Health and Digital Technologies, vol. 1 no. 2
Type: Research Article
ISSN: 2976-8756

Keywords

Article
Publication date: 4 November 2014

Sara Walton and Bronwyn Boon

– The purpose of this paper is to present an analytical method through which a political analysis of intra and inter-organizational conflicts may be conducted.

2649

Abstract

Purpose

The purpose of this paper is to present an analytical method through which a political analysis of intra and inter-organizational conflicts may be conducted.

Design/methodology/approach

The iterative method of data analysis the paper presents is based on a consolidation of work using Laclau and Mouffe’s discourse theory across both management and organization and social science disciplinary domains.

Findings

While the politically orientated discourse theory of Laclau and Mouffe has begun to be used by management and organization researchers, little guidance is available for how to actually conduct the analysis of data using this discourse approach. The method the paper proposes involves making explicit an analytical process for reading available textual data.

Originality/value

The value of this paper is primarily for management and organization researchers who are attracted to discourse theory but feel intimidated or confused about how to operationalize this theory into data analytic practice.

Details

Qualitative Research in Organizations and Management: An International Journal, vol. 9 no. 4
Type: Research Article
ISSN: 1746-5648

Keywords

Article
Publication date: 10 June 2014

T.V. Grissom, M. McCord, D. McIlhatton and M. Haran

The purpose of this paper, which is the first of a two-part series, is to build upon the established research on environmental economics and sustainability theory developed by…

Abstract

Purpose

The purpose of this paper, which is the first of a two-part series, is to build upon the established research on environmental economics and sustainability theory developed by Ramsey (1928), Weitzman (2007) and Gollier (2010). The Ramsey-Weitzman-Gollier model, with the contribution of Howarth (2009) and Nordhaus (2007a, b), focuses on discount rate development for environmental and long-term assets, linking discounted utility analysis embedded in the CCAPM model of Lucas (1978) to the policy concerns associated with the valuation of public and sustainable resources. This paper further investigates these issues to the rates structure appropriate for exhaustible resources with a particular emphasis on urban land, based upon the differentiation of strong and weak form sustainability concepts constrained by the objectives of the sustainable criterion of Daly and Cobb (1994).

Design/methodology/approach

The paper integrates the concepts of discount rate development for environmental and long-term assets and discounted utility analysis to the policy concerns associated with the valuation of public and sustainable resources. It develops new theoretical insight in order to allow the theoretical formulation of discount and capitalization rates that can be empirically applied and tested.

Findings

The paper provides theoretical support for a new approach concerned with the development of capitalization and discount rates in the valuation of non-renewable resources. A key concern of valuing non-renewable or limited resource endowments (in space or time) is the problem of irreversible investment or irrevocable decision implementation as suggested by Arrow-Fisher (1974), Krautkraemer (1985) and Daly and Cobb (1994). It investigates the challenge with developing capitalization rates and valuation of depleting resources temporally, within the constraints of sustainability. To achieve this, an optimal control discounting procedure subject to a sustainable objective statement is employed – in this context it suggests that sustainability should be treated as an alternative to traditional growth and the maximization of near-term returns.

Originality/value

This paper extends the construct of developing rates structures appropriate for the valuation of exhaustible resources. It places a conceptual emphasis on urban land development. The measures developed and the insights gained may serve as a basis for future research on the optimal levels of sustainable development appropriate for different nations.

Details

Property Management, vol. 32 no. 3
Type: Research Article
ISSN: 0263-7472

Keywords

Article
Publication date: 1 April 1969

‘Why,’ asks Tom Howarth, High Master of St. Paul's, ‘is it considered an almost unspeakable human defect to have élitist tendencies?’ Either Mr Howarth is unobservant or he…

Abstract

‘Why,’ asks Tom Howarth, High Master of St. Paul's, ‘is it considered an almost unspeakable human defect to have élitist tendencies?’ Either Mr Howarth is unobservant or he observes selectively.

Details

Education + Training, vol. 11 no. 4
Type: Research Article
ISSN: 0040-0912

Article
Publication date: 1 December 1948

N.A.V. Piercy, L.G. Whitehead and R.A. Tyler

THE greatly increased transition Reynolds numbers now attained in the boundary layers of cylinders having favourably shaped sections have renewed interest in the solution of the…

Abstract

THE greatly increased transition Reynolds numbers now attained in the boundary layers of cylinders having favourably shaped sections have renewed interest in the solution of the equations of steady flow in a thin boundary layer. It is familiar that the scries solutions of Blasius and Hiemenz, improved by Howarth (ref. 1), and of Falkner (ref. 2) become severely restricted in range when applied to cylinders having other than bluff sections. But it appears that a series solution of substantially greater range is possible, at least for symmetrical flow, provided that the nose of the section is rounded. This problem forms the subject of Section I of the present paper.

Details

Aircraft Engineering and Aerospace Technology, vol. 20 no. 12
Type: Research Article
ISSN: 0002-2667

1 – 10 of 753